Weak MFA Was Used To Successfully Sign In
Last updated
Last updated
Weak forms of multi-factor authentication (MFA) were used. Such methods could include SMS and voice calls, which are susceptible to attacks.
For Okta Identity Engine environments, accounts utilizing weak factors that are solely defined as recovery methods are excluded from this check.
Encourage your users to enroll and authenticate with more secure factors whenever possible. The National Institute of Standards and Technology (NIST) recommends using cryptographic solutions like Duo Security, Google Authenticator, Okta Verify, Microsoft Authenticator, or one-time passwords. If those methods aren't viable for your organization, consider tagging users with administrative privileges in critical services like Okta and Workday, and giving them physical authentication solutions like YubiKey.